HomeSort by relevance Sort by last modified time
    Searched defs:ptk_len (Results 1 - 4 of 4) sorted by null

  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 23 struct wpa_ptk *ptk, size_t ptk_len)
48 (u8 *) ptk, ptk_len, ptk_name);
49 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len);
377 size_t ft_ies_len, ptk_len; local
478 ptk_len = sm->pairwise_cipher != WPA_CIPHER_TKIP ? 48 : 64;
481 (u8 *) &sm->ptk, ptk_len, ptk_name);
483 (u8 *) &sm->ptk, ptk_len);
wpa.c 359 size_t ptk_len = sm->pairwise_cipher != WPA_CIPHER_TKIP ? 48 : 64; local
362 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len);
367 (u8 *) ptk, ptk_len,
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ft.c 344 struct wpa_ptk *ptk, size_t ptk_len)
380 (u8 *) ptk, ptk_len, ptk_name);
381 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len);
790 size_t buflen, ptk_len; local
881 ptk_len = pairwise == WPA_CIPHER_TKIP ? 64 : 48;
884 (u8 *) &sm->PTK, ptk_len, ptk_name);
886 (u8 *) &sm->PTK, ptk_len);
    [all...]
wpa_auth.c 1734 size_t ptk_len = sm->pairwise != WPA_CIPHER_TKIP ? 48 : 64; local
    [all...]

Completed in 606 milliseconds